Kotrappa Sirbi, Prakash Jayanth Kulkarni

Size: px
Start display at page:

Download "Kotrappa Sirbi, Prakash Jayanth Kulkarni"

Transcription

1 99 Stronger Enforcement of Security Using AOP & Spring AOP Kotrappa Sirbi, Prakash Jayanth Kulkarni Abstract An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tangling, but also results in weaker enforcement of security. This weaker enforcement of security could be due to the inherent design of the system or due to a programming error. Aspect Oriented Programming (AOP) complements Object- Oriented Programming (OOP) by providing another way of thinking about program structure. The key unit of modularity in OOP is the class, whereas in AOP the unit of modularity is the aspect. The goal of the paper is to present that Aspect Oriented Programming AspectJ integrated with Spring AOP provides very powerful mechanisms for stronger enforcement of security.aspectoriented programming (AOP) allows weaving a security aspect into an application providing additional security functionality or introducing completely new security mechanisms.implementation of security with AOP is a flexible method to develop separated, extensible and reusable pieces of code called aspects.in this comparative study paper, we argue that Spring AOP provides stronger enforcement of security than AspectJ.We have shown both Spring AOP and AspectJ strive to provide a comprehensive AOP solutions and complements each other. Index Terms Aspect Oriented Programming (AOP), AspectJ, Spring AOP, Acegi. 1 INTRODUCTION C omputer security is a science concerned with the control of risks related to computer use.the accelerating trends of interconnectedness, extensibility and complexity are increasing the threat of such a risk [1]. Application security hardening becomes a priority and one of the fastest growing fields in IT market today. The main goal of application security hardening is to reinforce the application security and therefore to minimize the likelihood of violating security properties.a legitimate question that one could ask is: What is the most appropriate computation style or programming paradigm for security hardening? A natural answer is to resort to an aspect oriented language. This answer is justified by the fact that aspect oriented languages have been created to deal with the separation of concerns. This is exactly what a security engineer needs when hardening an application. Security engineer would like to inject and strengthen security without digging in the logic of the application/middleware. Aspect Oriented Programming (AOP) [2] has been proposed as a way to improve modularity of software systems by allowing encapsulation of crosscutting concerns. Crosscutting concerns generally refer to non functional properties of software such as security, synchronization, Kotrappa Sirbi is with K L E s College of Engineering & Technology, Belgaum, , India Prakash Jayanth Kulkarni is with Walchand College of Engineering, Sangli, India logging, etc. When programmed, these crosscutting concerns result in tangled and scattered code. In this paper, we address the stronger enforcement of security of AspectJ comes with new concepts and constructs such as: join points, pointcuts, and advices [10].A join point is a point in the control flow graph of an application such as method call, object construction, or field access.a pointcut is a concept that classifies join points in the same way a type classifies values. Accordingly, AspectJ defines various pointcut constructors to designate various join points. An advice is a code fragment executed when join points satisfying its pointcut are reached. This execution can be done before, after, or around a specific join point. Spring introduces a simpler and more powerful way of writing custom aspects using either a schema-based approach or annotation style. Both of these styles offer fully typed advice and use of the AspectJ pointcut language, while still using Spring AOP for weaving. The spring supports schema AOP. Spring AOP [3] remains fully backwards compatible with Spring AOP and the lower-level AOP support offered by the Spring APIs of earlier version. AOP is used in the Spring Framework to provide declarative enterprise services, especially as a replacement for EJB declarative services. The most important such service is declarative transaction management and allow users to implement custom aspects, complementing their use of OOP with AOP. In this paper, we present a comparative study whether AspectJ alone enough and/or there is usefulness of Spring AOP for stronger enforcement of security in application development.

2 100 The remainder of this paper is structured in the following way.the security requirements in enterprise applications is discussed section 2 and section 3 deals with the AspectJ & Spring AOP features for security perspectives, section 4 discuss the implementation of access control and section 5 deals with comparision of AOP AspectJ and Spring AOP security features and their usefulness from a security point of view. 2 SECURITY REQUIREMENTS OF ENTER- PRISE APPLICATIONS Security is an important consideration in modern, highly connected software systems.most applications need to expose functionality through multiple interfaces to allow access to the business data and make complex integration possible. But they need to do so in a secured manner. It isn t a surprise that most enterprises spend substantial time, energy, and money to secure applications. Security is a very important issue in enterprise class information systems, especially in portal/internet applications. It is related to a possibly huge quantity of sensitive resources in the system and potentially unlimited users access to the application. A violation of security may cause catastrophic consequences for organizations whose security critical information may be disclosed without authorization, altered, lost, or destroyed. There are many standards of security functionality requirements for applications [6], [7], [8], [21]. The most important security functions are: Identification and authentication: the process of establishing and verifying the claimed identity of user, Access control: the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner, Accountability: the property that ensures that the actions of an entity may be traced uniquely to the entity, Audit: an independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, and to recommend any indicated changes in control, policy, and procedures. In this paper, we focus on authentication and access control functions of security. 3 AOP-ASPECTJ AND SPRING AOP SECURITY 3.1 Aspect Oriented Programming Aspect Oriented Programming (AOP) is the invention of a programming paradigm developed by the Xerox Palo Alto Research Center (Xerox PARC) in the 20th century [14],[15].It allows developers to separate tasks that should not be entangled with the crosscutting concerns, so as to provide better procedures for the encapsulation and interoperability.the core thought of AOP is to makes a complex system as combinations by a number of concerns to achieve. After demand researched, the concerns are divided into two parts: crosscutting concerns and core business concerns. Core business concern is the needs of the business logic and associated business subsystems, such as financial systems, personnel systems. And crosscutting concern is the needs of the various subsystems business, may be involved in some of the public functions, such as log records, security and so on. 3.2 AspectJ and Spring AOP AspectJ and Spring AOP concepts are: Aspect: A modularization of a concern that cuts across multiple objects. Join point: A point during the execution of a program, such as the execution of a method or the handling of an exception. In Spring AOP, a join point always represents a method execution. Join point information is available in advice bodies by declaring org.aspectj.lang.joinpoint parameter type. Advice: Action taken by an aspect at a particular join point. Different types of advice include ʺaround,ʺ ʺbeforeʺ and ʺafterʺ advice. Many AOP frameworks, including Spring, model an advice as an interceptor, maintaining a chain of interceptors aroundʺ the join point. Pointcut: A predicate that matches join points. Advice is associated with a pointcut expression and runs at any join point matched by the pointcut (for example, the execution of a method with a certain name).the concept of join points as matched by pointcut expressions is central to AOP.Spring uses the AspectJ pointcut language by default. Introduction: Also known as an inter type declaration.declaring additional methods or fields on behalf of a type. Spring AOP allows introducing new interfaces and a corresponding implementation to any proxied object. Target object: Object being advised by one or more aspects. Also referred to as the advised object. Since Spring AOP is implemented using runtime proxies, this object will always be a proxied object. Weaving: Linking aspects with other application types or objects to create an advised object. This can be done at compile time (using the AspectJ compiler, for example), load time, or at runtime. Spring AOP, like other pure Java AOP frameworks, performs weaving at runtime. Different advice types include: Around advice: Advice that surrounds a joinpoint such as a method invocation. This is the most powerful kind of advice. Around advices will perform custom behavior before and after the method invocation.they are responsible for choosing whether to proceed to the joinpoint or to

3 101 shortcut executing by returning their own return value or throwing an exception. Before advice: Advice that executes before a joinpoint, but which does not have the ability to prevent execution flow proceeding to the joinpoint unless it throws an exception. Throws advice: Advice to be executed if a method throws an exception.spring provides strongly typed throws advice, so it is possible to write code that catches the exception (and subclasses),without needing to cast from Throwable or Exception. After returning advice: Advice to be executed after a joinpoint completes normally i.e., if a method returns without throwing an exception. Around advice is the most general kind of advice. Most interception-based AOP frameworks, such as Nanning Aspects, provide only around advice. As spring, like AspectJ, provides a full range of advice types.the pointcut concept is the key to AOP, distinguishing AOP from older technologies offering interception.pointcuts enable advice to be targeted independently of the OO hierarchy and also pointcuts provide the structural element of AOP. AspectJ has a comprehensive and expressive pointcut specification language that allows specifying particular points in the control flow of the program where advices are to be applied. All of them are important from a security standpoint.table 1 shows the usefulness of the AspectJ pointcuts according to the security target. Although AspectJ supports those efficient and useful pointcut designators for security hardening, they are not enough to express all the security hardening practices. Indeed, the following possible extensions to AspectJ are identified for security hardening: Dataflow pointcut. Predicted control flow pointcut. Loop pointcut. Wildcard for pattern matching. Modifiers in type pattern syntax. Pointcuts for getting and setting local variables. Synchronized block join points. The detailed discussion about the suggested extensions available in [4], [5], [10],[12],[13],[18]. 3.3 Spring AOP and Security Spring AOP In Spring AOP aspects are nothing more than regular spring beans, which themselves are plain-old Java objects (POJO) registered suitably with the Spring Inversion of Control container. The core advantage in using Spring AOP is its ability to realize the aspect as a plain Java class. In Spring AOP, a join point exclusively pertains to method execution only, which could be viewed as a limitation of Spring AOP. However, in reality, it is enough to handle most common cases of implementing crosscutting concern. Spring AOP uses the AspectJ pointcut expression syntax [3], [9], [11], [16], [19]. TABLE 1 ASPECTJ POINTCUT AND SECURITY Spring Security Spring security began in late 2003 as The Acegi Security System for Spring, Acegi Security became an official Spring Portfolio project towards the end of 2007 and was rebranded as Spring Security [17].Spring Security (formerly known as Acegi) along with AOP can simplify the implementation of the classic crosscutting concern of stronger enforcement of security in an application. Enterprise applications need to address many crosscutting functionalities: transaction management, security, auditing, service-level agreement, monitoring, concurrency control, improving application availability, error handling, and so on. Many enterprise applications use AOP to implement these functionalities. All the examples in given here are based on real-world problems and their AOP solutions.virtually every project that uses Spring uses AOP [9].Many applications start with prewritten aspects supplied with Spring (primarily transaction management and security).but due to the AspectJ syntax, writing custom aspects is becoming a common task. After reaching the limits of Spring AOP, many applications move toward AspectJ weaving. The typical trigger point for this change is crosscutting of domain objects or other forms of deeper crosscutting functionalities.at that time, it s common to start with the AspectJ syntax (which is used with Spring s proxy-based AOP) along with the load-time weaver. However, applications that don t use spring often use AspectJ weaving from the beginning. Spring security along with AOP can simplify the implementation of the classic crosscutting concern of securing enterprise application.the security aspect needs to do two things, firstly select join points that need authentication or authorization and then advise the selected join points to perform authentication and authorization as shown in Listing 1. The interesting piece of code is the computation of the security attributes. In the conventional technique, each method creates a separate security attribute object. In an AOP solution, the same advice applies to all advised join points, yet each join point may require a different attribute.therefore, the advice may need some cooperation from the advised code or some external configuration

4 102 to compute a correct attribute at each join point. One way to achieve this collaboration is to use annotations and also security aspects can be applied using either the proxybased or byte code based AOP. The security aspect acts as a controller that mediates between the core system and the security subsystem. Figure 1 show the overall structure used in Spring Security for authentication. Authorization is a process that establishes whether an authenticated user has sufficient privileges to access certain resources. For example, only users with the admin privilege may access certain web pages or invoke certain business methods. Spring Security provides role-based and object-level authorization. To accommodate potentially complex custom requirements, it provides several components that can customize. Figure 2 depicts the authorization sequence. Security requirements vary widely, and many implementations exist to meet these needs [20], [21]. For example, an authentication requirement may vary from simple web-based authentication to a single sign-on solution.storage for credentials (such as passwords) and authorities (typically roles such as ADMIN or USER) varies widely as well from a simple text file to a database or Lightweight Directory Access Protocol (LDAP).These variations make the already complex topic of security even more so. The increased complexity warrants raising the level of abstraction. But creating such an abstraction is very complex task. This is where Spring Security comes into play [16]. By providing an abstraction layer and an implementation for most commonly used security systems. Furthermore, Spring Security provides ready-made solutions for a few common scenarios that allow implementing certain security requirements by including just a few lines of configuration. 4 ACCESS CONTROL TECHNIQUES IN SPRING AOP Access control is a server side mechanism.after invokeng a method the decision has to be made whether the method is allowed to be executed or not [20]. Authentication is a process that verifies that the user (human or machine) is indeed whom they claim to be. For example, the system may challenge the user with a username and password. When the user enters that information, the system verifies it against the stored credentials. Spring Security supports authentication using a wide range of authentication schemes such as basic, forms, database, LDAP, JAAS, and single sign-on. It can also be roll its own authentication to support the specific scheme that the organization is using (and still utilize the rest of the framework, including authorization).after the user credentials have been authenticated, the authenticated user (known as the principal) is stored in the security context. Implementing security using proxy based Spring AOP shown in Figure 3.Because of similarities due to the common use of AOP as the underlying mechanism. Spring AOP creates a proxy around the service beans, and the security advice ensures authorized access. Spring AOP works only with spring beans. 3.1 Spring Security prebuilt solutions Spring Security provides ready-made solutions that enable developers to secure applications with a few lines of configuration. These solutions target different parts of application: web, service layer, and domain objects.

5 Web security Securing web applications is a common task, therefore, Spring Security provides special support for this scenario. With namespace-based configuration, a few lines can configure URL level security that ensures that the user has the right authority to access the URLs. 5 IMPLEMENTATION OF SECURITY 5.1 Implementaion of Authentication To implement security, 3 rd party example is used which is party implemented using Acegi. Acegi [17] is a popular and flexible security framework that can be used in enterprise applications.acegi integrates well with spring and uses spring application contexts for all configurations. Using Acegi Security greatly simplifies implementing authorization in application in a flexible manner. To implement, start with POJO class that will implement the security concern as a Spring AOP[3],[9],[16] aspect and the implementation of method checksecurity ( ) (as shown in Listing 3) involves using Acegi APIs and classes such as SecurityContextHolder for retrieving the authenticated user and the user's role. Using the user and his role, an application-specific authorization can be implemented. For example, the following spring configuration provides authentication using a default login page and ensures that any URLs that end with delete.htm are accessible only by users with the ADMIN role. Other URLs are accessed only by users with the USER role. The declaration of user service to provide username/password Typically, firstly start with a simple snippet as shown in listings 2, modify various attributes, and add additional elements to tailor to the specific needs Service Level Security Because most enterprise applications utilize a service layer as the exclusive way of accessing business functionality, it makes sense to secure this layer. Spring Security provides prebuilt aspects along with namespace-based configuration support to secure the service layer with minimal code. It offers two options to specify the accesscontrol information: through the XML-based configuration and through annotations. The important thing to note here is that the entire authorization check lies in a separate aspect (POJO class), which is distinct from the business logic code.this security aspect can be effectively applied to business logic method using the following spring configuration.firstly, register the regular Java class SecurityAspect with spring as a spring bean and then, specify the pointcut and advice: The pointcut expression is execution (*com.myorg.springaop.examples.myservice*.*(..) ) The advice type is "around," and the aspect method name is checksecurity.

6 104 The spring configuration (as shown in Listing 4) for the security aspect, Additionally, a spring configuration is needed for configuring Acegi with spring. The configuration uses an inmemory data access object (DAO) provider, in which case, the developer specifies the potential users and roles in the application as simple name-value pairs, as a part of the static spring configuration file. This can easily be inferred from the following spring configuration (as shown in Listing 5): programmer needs to add additional fields to a class, or advise fine-grained objects that are not created by the Spring IoC container, in that situation Aspectj is best alternative. Also spring provides a powerful integration with AspectJ.The most important part of the Spring/AspectJ integration allows spring to configure AspectJ aspects using Dependency Injection. This brings similar benefits to aspects as to objects. There is no need for aspects to use ad hoc configuration mechanisms; they can be configured in the same, consistent, approach used for the entire application. Aspects can depend on application objects. For example, a security aspect can depend on a security manager. It's possible to obtain a reference to an aspect through the relevant spring context. This can allow for dynamic reconfiguration of the aspect. AspectJ aspects can expose JavaBean properties for Setter Injection, and even implement spring lifecycle interfaces such as BeanFactoryAware.In most cases, AspectJ aspects are singletons, with one instance per class loader. This single instance is responsible for advising multiple object instances.a Spring IoC container cannot instantiate an aspect, as aspects don't have callable constructors. But it can obtain a reference to an aspect using the static aspectof() method that AspectJ defines for all aspects, and it can inject dependencies into that aspect. Consider a security aspect, which depends on a security manager. This aspects applies to all changes in the value of the balance instance variable in the Account class.it couldn't do in case of using Spring AOP.The AspectJ code for the aspect (one of the Spring/AspectJ samples), is shown below (Listing 6) 5.2 Case Study: AspectJ and Spring AOP Integration Spring's proxy-based AOP framework is well suited for handling many generic middleware and application specific problems. However, there are times when a more powerful AOP solution is required: for example, if This aspect can be configuring in the same way as an ordinary class. Developer doesn t need to do anything in spring configuration to target this aspect. It contains the pointcut information in AspectJ code that controls where it applies. Thus it can apply even to objects not managed by the Spring IoC container.using AspectJ pointcuts to target spring advice, we plan to provide the ability for AspectJ pointcut expressions to be used in Spring XML or other

7 105 bean definition files, to target spring advice. This will allow some of the power of the AspectJ pointcut model to be applied to spring s proxy-based AOP framework. This will work in pure Java, and will not require the AspectJ compiler. Only the subset of AspectJ pointcuts relating to method invocation will be usable.in a latest release of spring will have some spring services packages, such as the declarative transaction management service, as AspectJ aspects. This will enable developer to be used by AspectJ users without dependence on the Spring AOP framework potentially, even without dependence on the Spring IoC container. This feature is probably of more interest to AspectJ users than spring users [20]. 6 CONCLUSION Without AOP the functionalities of security would be scattered across the application, with the same code duplicated in different modules. In fact, AOP applied to security solves most of the common practical problems concerning security. We have seen how it is possible to implement these functionalities without having tangled or scattered code, implementing functionalities with aspects and advices.with AOP AspectJ and Spring AOP, configuring it properly for stronger enforcement security of the application thereby we can have cleaner code, much more concise and easier to maintain, debug and adopt. This paper shows how Spring AOP Security up close to reality through implementation of authentication and authorization security crosscutting concerns for strong enforcement of security. REFERENCES [1] G. McGraw and G. Morrisett. Attacking Malicious Code : A Report to the Infosec Research Council. IEEE Software, 17(5):33 41, [2] G. Kiczales, J. Lamping, A. Menhdhekar, C. Maeda, C.Lopes, J.M.Loingtier, and J. Irwin. Aspect oriented programming. In Mehmet Aks it and Satoshi Matsuoka, editors, Proceedings European Conference on Object- Oriented Programming, volume 1241, pages Springer-Verlag, Berlin, Heidelberg, and New York, [3] Ramnivas Laddad, Enterprise AOP with Spring Applications: AspectJ in Action, 2 nd Edition, Manning Publications, [4] Ramnivas Laddad, AspectJ in Action: Practical Aspect- Oriented Programming by Manning Publications, [5] G. Kiczales, E. Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, and William Griswold. An Overview of AspectJ by Budapest, 2001.Springer Verlag. [6] Security Functionality Requirements, National Institute of Standards and Technology, [7] Technical Security Standard for Information Technology (TSSIT), Government of Canada, [8] Information Technology Security Evaluation Criteria (ITSEC), Department of Trade and Industry, London, [9] Massimiliano Dessì Spring 2.5 Aspect-Oriented Programming by Packt Publishing [10] Dima Alhadidi, Nadia Belblidiay, Mourad Debbabi, AspectJ Assessment from a Security Perspective by Concordia Institute for Information Systems Engineering Concordia University, Montreal, Quebec, Canada. [11] Aspect Oriented programming with Spring; Spring Framework: html [12] AspectJ Group Tutorial - Aspect-Oriented Programming with AspectJ by AspectJ Workshop, Xerox PARC, tj/ [13] AspectJ, [14] AOP Issue, Communications of the ACM, Volume 44, Number 10, 2001 [15] Elrad, T, R. Filman, A. Bader. Aspect-Oriented Programming. CACM, Volume 44, Number 10, [16] [17] [18] Dima Alhadidi, Nadia Belblidia, Amine boukhtouta, Mourad Debbabi. Extending AspectJ Open Source for Application Security Hardening by Concordia Institute for Information Systems Engineering, Concordia University. [19] /reference/springsecurity-single.html [20] Pawel Slowikowski,Krzysztof Zielinski, Comparison Study of Aspect Oriented and Container Managed Security by AGH University of Seince and Technology, Krakow, university in Poland. [21] Kotrappa Sirbi, Prakash Jayanth Kulkarni, Embedding Security using Aspect Oriented Programming by International Journal of Computer Engineering & Information Technology, SERC Kotrappa Sirbi, M Tech (CSE, 2009), M S (Software System, 1994) and B E (EE, 1984) working with K L E s College of Enginering & Technology Belgaum, India since Dec 1985 and at present working with KLE s BCA, R L S Institute, Belgaum (on deputation).having two International conferences and two National conferences papers and two journal papers published.areas of interest are Software Engineering, Object Technology and its evolutions like., Design Patterns, Subject Oriented Programming(SOP) and Aspect Oriented Programming(AOP).Membership of Technical profesional bodies:life member of ISTE(Indian Society For Technical Education) and member of CSTA (Computer Science Teacher Association),ACM. Prakash Jayanth Kulkarni Ph.D (Electronics, 1993), M E (Electronics, 1986) by Research and B E (Electronics & Telecommunication) working with Walchand College of Engineering, Sangli, India since 1981 and worked with Trans Lines Division, M.S.E.B,having thirteen International conferences papers and nine National Conference papers and six journals paper. His areas of interest are Digital Communication, Digital Image Processing and Computer Vision, Software Engineering, Artificial Neural Network and Genetic Algorithms. In 2001 he received a distinguish Samaj Shree Award for rendering services to society.

Aspect-Oriented Programming

Aspect-Oriented Programming Aspect-Oriented Programming An Introduction to Aspect-Oriented Programming and AspectJ Niklas Påhlsson Department of Technology University of Kalmar S 391 82 Kalmar SWEDEN Topic Report for Software Engineering

More information

Aspect-Oriented Web Development in PHP

Aspect-Oriented Web Development in PHP Aspect-Oriented Web Development in PHP Jorge Esparteiro Garcia Faculdade de Engenharia da Universidade do Porto jorge.garcia@fe.up.pt Abstract. Aspect-Oriented Programming (AOP) provides another way of

More information

Generating Aspect Code from UML Models

Generating Aspect Code from UML Models Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,

More information

Aspect Oriented Programming. with. Spring

Aspect Oriented Programming. with. Spring Aspect Oriented Programming with Spring Problem area How to modularize concerns that span multiple classes and layers? Examples of cross-cutting concerns: Transaction management Logging Profiling Security

More information

Aspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns

Aspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns Aspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns CS 586 Aspect-Oriented Software Development Project Group Members : Başak Çakar, Elif Demirli, Şadiye Kaptanoğlu Bilkent

More information

Coordinated Visualization of Aspect-Oriented Programs

Coordinated Visualization of Aspect-Oriented Programs Coordinated Visualization of Aspect-Oriented Programs Álvaro F. d Arce 1, Rogério E. Garcia 1, Ronaldo C. M. Correia 1 1 Faculdade de Ciências e Tecnologia Universidade Estadual Paulista Júlio de Mesquita

More information

A COMPARISON OF AOP BASED MONITORING TOOLS

A COMPARISON OF AOP BASED MONITORING TOOLS STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LVI, Number 3, 2011 A COMPARISON OF AOP BASED MONITORING TOOLS GRIGORETA S. COJOCAR AND DAN COJOCAR Abstract. The performance requirements of a software system

More information

Integration of Application Business Logic and Business Rules with DSL and AOP

Integration of Application Business Logic and Business Rules with DSL and AOP Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska and Krzysztof Kasprzyk Wroclaw University of Technology, Wyb. Wyspianskiego 27 50-370 Wroclaw, Poland Bogumila.Hnatkowska@pwr.wroc.pl

More information

Unification of AOP and FOP in Model Driven Development

Unification of AOP and FOP in Model Driven Development Chapter 5 Unification of AOP and FOP in Model Driven Development I n this chapter, AOP and FOP have been explored to analyze the similar and different characteristics. The main objective is to justify

More information

Toward Configurable Access Control for. Healthcare Information Systems

Toward Configurable Access Control for. Healthcare Information Systems Toward Configurable Access Control for Healthcare Information Systems Kung Chen a and Da-Wei Wang b a Department of Computer Science, National Chengchi University b Institute of Information Science, Academia

More information

New Generation of Software Development

New Generation of Software Development New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 tyehon@cs.ubc.ca ABSTRACT In this paper, I present a picture of what software development

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Progress Report Aspect Oriented Programming meets Design Patterns. Academic Programme MSc in Advanced Computer Science. Guillermo Antonio Toro Bayona

Progress Report Aspect Oriented Programming meets Design Patterns. Academic Programme MSc in Advanced Computer Science. Guillermo Antonio Toro Bayona Progress Report Aspect Oriented Programming meets Design Patterns Academic Programme MSc in Advanced Computer Science Guillermo Antonio Toro Bayona Supervisor Dr. John Sargeant The University of Manchester

More information

OUR COURSES 19 November 2015. All prices are per person in Swedish Krona. Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden

OUR COURSES 19 November 2015. All prices are per person in Swedish Krona. Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden OUR COURSES 19 November 2015 Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden Java for beginners JavaEE EJB 3.1 JSF (Java Server Faces) PrimeFaces Spring Core Spring Advanced Maven One day intensive

More information

Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems

Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems The 15th International Conference on Product-Focused Software Process Improvement, Helsinki, Finland. Wen Chen, Alan Wassyng,

More information

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control. ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource

More information

Chapter 5 Aspect Oriented Programming

Chapter 5 Aspect Oriented Programming 2I1AC3 : Génie logiciel et Patrons de conception Chapter 5 Aspect Oriented Programming J'ai toujours rêvé d'un ordinateur qui soit aussi facile à utiliser qu'un téléphone. Mon rêve s'est réalisé. Je ne

More information

Using an Aspect Oriented Layer in SOA for Enterprise Application Integration

Using an Aspect Oriented Layer in SOA for Enterprise Application Integration 19 Using an Aspect Oriented Layer in SOA for Enterprise Application Integration Chinthaka D. Induruwana School of Computer Science, University of Manchester, Kilburn Building, Oxford Road M13 9PL induruwc@cs.man.ac.uk

More information

<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style

<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators

More information

Aspects for Testing Aspects?

Aspects for Testing Aspects? Aspects for Testing Aspects? Dehla Sokenou, Stephan Herrmann Technische Universität Berlin Software Engineering Group Sekr. FR 5-6, Franklinstr. 28/29, D-10587 Berlin [dsokenou stephan]@cs.tu-berlin.de

More information

Implementing COOL in JAMI

Implementing COOL in JAMI Implementing COOL in JAMI Steven te Brinke s.tebrinke@student.utwente.nl ABSTRACT JAMI aims to be a generic aspect interpreter framework which can be used to prototype a wide range of AOP languages. However,

More information

Welcome to Spring Forward 2006. www.springforward2006.com September 26, 2006 Penn State Great Valley

Welcome to Spring Forward 2006. www.springforward2006.com September 26, 2006 Penn State Great Valley Welcome to Spring Forward 2006 Securing Your Applications with CAS and Acegi Dmitriy Kopylenko Application Developer Architecture & Framework Rutgers University Scott Battaglia Application Developer Enterprise

More information

SPRING INTERVIEW QUESTIONS

SPRING INTERVIEW QUESTIONS SPRING INTERVIEW QUESTIONS http://www.tutorialspoint.com/spring/spring_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Spring Interview Questions have been designed specially to

More information

Using EMC Documentum with Adobe LiveCycle ES

Using EMC Documentum with Adobe LiveCycle ES Technical Guide Using EMC Documentum with Adobe LiveCycle ES Table of contents 1 Deployment 3 Managing LiveCycle ES development assets in Documentum 5 Developing LiveCycle applications with contents in

More information

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns. Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional

More information

Component-Based Software Development with Aspect-Oriented Programming

Component-Based Software Development with Aspect-Oriented Programming Vol. 4, No. 3 Special issue: GPCE Young Researchers Workshop 2004 Component-Based Software Development with Aspect-Oriented Programming Michael Eichberg, Departement of Computer Science, Darmstadt University

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.3, July 2012. Vishnuvardhan Mannava 1 and T. Ramesh 2

International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.3, July 2012. Vishnuvardhan Mannava 1 and T. Ramesh 2 COMPOSITE DESIGN PATTERN FOR FEATURE- ORIENTED SERVICE INJECTION AND COMPOSITION OF WEB SERVICES FOR DISTRIBUTED COMPUTING SYSTEMS WITH SERVICE ORIENTED ARCHITECTURE Vishnuvardhan Mannava 1 and T. Ramesh

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Using weblock s Servlet Filters for Application-Level Security

Using weblock s Servlet Filters for Application-Level Security Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from

More information

Glassbox: Open Source and Automated Application Troubleshooting. Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com

Glassbox: Open Source and Automated Application Troubleshooting. Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com Glassbox: Open Source and Automated Application Troubleshooting Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com First a summary Glassbox is an open source automated troubleshooter for Java

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

Remote Pointcut - A Language Construct for Distributed AOP

Remote Pointcut - A Language Construct for Distributed AOP Remote Pointcut - A Language Construct for Distributed AOP Muga Nishizawa (Tokyo Tech) Shigeru Chiba (Tokyo Tech) Michiaki Tatsubori (IBM) 1 Pointcut-advice model Joinpoints Program execution is modeled

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

Delivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Application

Delivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Application 18 th World IMACS / MODSIM Congress, Cairns, Australia 13-17 July 2009 http://mssanz.org.au/modsim09 Delivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Abstract: Bai, Q.F

More information

Designing an Enterprise Application Framework for Service-Oriented Architecture 1

Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Shyam Kumar Doddavula, Sandeep Karamongikar Abstract This article is an attempt to present an approach for transforming

More information

Integration of Application Business Logic and Business Rules with DSL and AOP

Integration of Application Business Logic and Business Rules with DSL and AOP e-informatica Software Engineering Journal, Volume 4, Issue, 200 Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska, Krzysztof Kasprzyk Faculty of Computer

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

Encapsulating Crosscutting Concerns in System Software

Encapsulating Crosscutting Concerns in System Software Encapsulating Crosscutting Concerns in System Software Christa Schwanninger, Egon Wuchner, Michael Kircher Siemens AG Otto-Hahn-Ring 6 81739 Munich Germany {christa.schwanninger,egon.wuchner,michael.kircher}@siemens.com

More information

How To Combine Feature-Oriented And Aspect-Oriented Programming To Support Software Evolution

How To Combine Feature-Oriented And Aspect-Oriented Programming To Support Software Evolution Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution Sven Apel, Thomas Leich, Marko Rosenmüller, and Gunter Saake Department of Computer Science Otto-von-Guericke-University

More information

Composing Concerns with a Framework Approach

Composing Concerns with a Framework Approach Composing Concerns with a Framework Approach Constantinos A. Constantinides 1,2 and Tzilla Elrad 2 1 Mathematical and Computer Sciences Department Loyola University Chicago cac@cs.luc.edu 2 Concurrent

More information

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution

Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution Sven Apel, Thomas Leich, Marko Rosenmüller, and Gunter Saake Department of Computer Science University of Magdeburg,

More information

Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB

Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets

More information

How To Manage Web Content Management System (Wcm)

How To Manage Web Content Management System (Wcm) WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious

Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Project Software Security: Securing SendMail with JAAS and Polymer

Project Software Security: Securing SendMail with JAAS and Polymer Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet frank@pine.nl Diego Ortiz Yepes d.a.ortiz.yepes@student.tue.nl Jornt van der Wiel j.h.v.d.wiel@student.tue.nl Guido Kok

More information

Enterprise Application Development In Java with AJAX and ORM

Enterprise Application Development In Java with AJAX and ORM Enterprise Application Development In Java with AJAX and ORM ACCU London March 2010 ACCU Conference April 2010 Paul Grenyer Head of Software Engineering p.grenyer@validus-ivc.co.uk http://paulgrenyer.blogspot.com

More information

The Nature and Importance of a Programming Paradigm

The Nature and Importance of a Programming Paradigm Multiple Software Development Paradigms and Multi-Paradigm Software Development Valentino Vranić vranic@elf.stuba.sk Abstract: While OOP (including OOA/D) is reaching the level of maturity of structured

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

Aspect-Oriented Multi-Client Chat Application

Aspect-Oriented Multi-Client Chat Application Aspect-Oriented Multi-Client Chat Application Duygu Ceylan, Gizem Gürcüoğlu, Sare G. Sevil Department of Computer Engineering, Bilkent University Ankara, Turkey 06800 dceylan, gizem, sareg @cs.bilkent.edu.tr

More information

SSC - Web development Model-View-Controller for Java web application development

SSC - Web development Model-View-Controller for Java web application development SSC - Web development Model-View-Controller for Java web application development Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Java Server

More information

ActiveVOS Server Architecture. March 2009

ActiveVOS Server Architecture. March 2009 ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...

More information

Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework

Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 1 (2013), pp. 53-69 Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework Marcin Kwapisz 1 1 Technical University of Lodz Faculty

More information

Architecture Rules Enforcement and Governance Using Aspects

Architecture Rules Enforcement and Governance Using Aspects Architecture Rules Enforcement and Governance Using Aspects Srini Penchikala SATURN 2009 About the Speaker Enterprise Architect Writer, Speaker, Editor (InfoQ) Detroit Java User Group Leader Working with

More information

Research Article. ISSN 2347-9523 (Print) *Corresponding author Lili Wang Email: lily@nepu.edu.cn

Research Article. ISSN 2347-9523 (Print) *Corresponding author Lili Wang Email: lily@nepu.edu.cn Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4B):424-428 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Harmless Advice. Daniel S Dantas Princeton University. with David Walker

Harmless Advice. Daniel S Dantas Princeton University. with David Walker Harmless Advice Daniel S Dantas Princeton University with David Walker Aspect Oriented Programming Aspect Oriented Programming IBM - 2004 IBM reports positive results in aspect-oriented programming experiments

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Software Development Kit

Software Development Kit Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice

More information

Converting Java EE Applications into OSGi Applications

Converting Java EE Applications into OSGi Applications Converting Java EE Applications into OSGi Applications Author: Nichole Stewart Date: Jan 27, 2011 2010 IBM Corporation THE INFORMATION CONTAINED IN THIS REPORT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,

More information

Overview. Edvantage Security

Overview. Edvantage Security Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect

More information

AOJS: Aspect-Oriented JavaScript Programming Framework for Web Development

AOJS: Aspect-Oriented JavaScript Programming Framework for Web Development AOJS: Aspect-Oriented JavaScript Programming Framework for Web Development Hironori Washizaki,Atsuto Kubo,Tomohiko Mizumachi,Kazuki Eguchi,Yoshiaki Fukazawa Waseda University, 3-4-1, Okubo, Shinjuku-ku,

More information

The Spring Framework: An Open Source Java Platform for Developing Robust Java Applications

The Spring Framework: An Open Source Java Platform for Developing Robust Java Applications International Journal of Innovative Technology and Exploring Engineering (IJITEE) The Spring Framework: An Open Source Java Platform for Developing Robust Java Applications Dashrath Mane, Ketaki Chitnis,

More information

Load balancing using Remote Method Invocation (JAVA RMI)

Load balancing using Remote Method Invocation (JAVA RMI) Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Distributed Systems Development: Can we Enhance Evolution by using AspectJ?

Distributed Systems Development: Can we Enhance Evolution by using AspectJ? Distributed Systems Development: Can we Enhance Evolution by using AspectJ? Cormac Driver Siobhán Clarke Distributed Systems Group, Computer Science Department, Trinity College Dublin, Ireland {Cormac.Driver,

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Beginning POJOs. From Novice to Professional. Brian Sam-Bodden

Beginning POJOs. From Novice to Professional. Brian Sam-Bodden Beginning POJOs From Novice to Professional Brian Sam-Bodden Contents About the Author Acknowledgments Introduction.XIII xv XVII CHAPTER1 Introduction The Java EE Market Case Study: The TechConf Website...

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Controlling Web Access with BMC Web Access Manager WHITE PAPER Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3

More information

Concern Highlight: A Tool for Concern Exploration and Visualization

Concern Highlight: A Tool for Concern Exploration and Visualization Concern Highlight: A Tool for Concern Exploration and Visualization Eugen C. Nistor André van der Hoek Department of Informatics School of Information and Computer Sciences University of California, Irvine

More information

Introducing a Graduate Course on. called Aspect-Oriented Software Development

Introducing a Graduate Course on. called Aspect-Oriented Software Development Int. J. Engng Ed. Vol. 21, No. 2, pp. 361±368, 2005 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 2005 TEMPUS Publications. Introducing a Graduate Course on Aspect-Oriented Software Development*

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

Java Application Developer Certificate Program Competencies

Java Application Developer Certificate Program Competencies Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle

More information

Defense In-Depth to Achieve Unbreakable Database Security

Defense In-Depth to Achieve Unbreakable Database Security Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their

More information

Oracle Application Development Framework Overview

Oracle Application Development Framework Overview An Oracle White Paper June 2011 Oracle Application Development Framework Overview Introduction... 1 Oracle ADF Making Java EE Development Simpler... 2 THE ORACLE ADF ARCHITECTURE... 3 The Business Services

More information

OASIS: Organic Aspects for System Infrastructure Software Easing Evolution and Adaptation through Natural Decomposition

OASIS: Organic Aspects for System Infrastructure Software Easing Evolution and Adaptation through Natural Decomposition OASIS: Organic Aspects for System Infrastructure Software Easing Evolution and Adaptation through Natural Decomposition Celina Gibbs and Yvonne Coady University of Victoria Abstract It is becoming increasingly

More information

Aspect Refactoring Verifier

Aspect Refactoring Verifier Aspect Refactoring Verifier Charles Zhang and Julie Waterhouse Hans-Arno Jacobsen Centers for Advanced Studies Department of Electrical and IBM Toronto Lab Computer Engineering juliew@ca.ibm.com and Department

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

How to Model Aspect-Oriented Web Services

How to Model Aspect-Oriented Web Services How to Model Aspect-Oriented Web Services Guadalupe Ortiz Juan Hernández gobellot@unex.es juanher@unex.es Quercus Software Engineering Group University of Extremadura Computer Science Department Pedro

More information

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one

More information

Roles in Building Web Applications using Java

Roles in Building Web Applications using Java Roles in Building Web Applications using Java Guido Boella Dipartimento di Informatica Università di Torino Italy +390116706711 guido@di.unito.it Andrea Cerisara Dipartimento di Informatica Università

More information

Java EE 7: Back-End Server Application Development

Java EE 7: Back-End Server Application Development Oracle University Contact Us: 01-800-913-0322 Java EE 7: Back-End Server Application Development Duration: 5 Days What you will learn The Java EE 7: Back-End Server Application Development training teaches

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

Aspect-oriented software engineering

Aspect-oriented software engineering M21_SOMM5152_09_SE_C21.qxd 1/7/10 2:31 PM Page 565 21 Aspect-oriented software engineering Objectives The objective of this chapter is to introduce you to aspect-oriented software development, which is

More information

Enterprise AOP with Spring Applications IN ACTION SAMPLE CHAPTER. Ramnivas Laddad FOREWORD BY ROD JOHNSON MANNING

Enterprise AOP with Spring Applications IN ACTION SAMPLE CHAPTER. Ramnivas Laddad FOREWORD BY ROD JOHNSON MANNING Enterprise AOP with Spring Applications IN ACTION SAMPLE CHAPTER Ramnivas Laddad FOREWORD BY ROD JOHNSON MANNING AspectJ in Action Second Edition by Ramnivas Laddad Chapter 10 Copyright 2010 Manning Publications

More information

HPC Portal Development Platform with E-Business and HPC Portlets

HPC Portal Development Platform with E-Business and HPC Portlets HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: garywu@nchc.org.tw Abstract HPC Portal Development

More information

OpenLDAP Oracle Enterprise Gateway Integration Guide

OpenLDAP Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and

More information

Dynamic Adaptability of Services in Enterprise JavaBeans Architecture

Dynamic Adaptability of Services in Enterprise JavaBeans Architecture 1. Introduction Dynamic Adaptability of Services in Enterprise JavaBeans Architecture Zahi Jarir *, Pierre-Charles David **, Thomas Ledoux ** zahijarir@ucam.ac.ma, {pcdavid, ledoux}@emn.fr (*) Faculté

More information

MarkLogic Server. Understanding and Using Security Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Understanding and Using Security Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved. Understanding and Using Security Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Understanding

More information